· 5 years ago · Mar 14, 2020, 04:38 PM
1Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-14 17:16 CET
2NSE: Loaded 151 scripts for scanning.
3NSE: Script Pre-scanning.
4Initiating NSE at 17:16
5Completed NSE at 17:16, 0.00s elapsed
6Initiating NSE at 17:16
7Completed NSE at 17:16, 0.00s elapsed
8Initiating NSE at 17:16
9Completed NSE at 17:16, 0.00s elapsed
10Initiating Ping Scan at 17:16
11Scanning 254 hosts [2 ports/host]
12Completed Ping Scan at 17:16, 11.98s elapsed (254 total hosts)
13Initiating Parallel DNS resolution of 254 hosts. at 17:16
14Completed Parallel DNS resolution of 254 hosts. at 17:16, 0.08s elapsed
15Nmap scan report for 192.168.1.3 [host down]
16Nmap scan report for 192.168.1.4 [host down]
17Nmap scan report for 192.168.1.5 [host down]
18Nmap scan report for 192.168.1.6 [host down]
19Nmap scan report for 192.168.1.7 [host down]
20Nmap scan report for 192.168.1.8 [host down]
21Nmap scan report for 192.168.1.9 [host down]
22Nmap scan report for 192.168.1.10 [host down]
23Nmap scan report for 192.168.1.11 [host down]
24Nmap scan report for 192.168.1.12 [host down]
25Nmap scan report for 192.168.1.13 [host down]
26Nmap scan report for 192.168.1.14 [host down]
27Nmap scan report for 192.168.1.15 [host down]
28Nmap scan report for 192.168.1.16 [host down]
29Nmap scan report for 192.168.1.17 [host down]
30Nmap scan report for 192.168.1.18 [host down]
31Nmap scan report for 192.168.1.19 [host down]
32Nmap scan report for 192.168.1.20 [host down]
33Nmap scan report for 192.168.1.21 [host down]
34Nmap scan report for 192.168.1.22 [host down]
35Nmap scan report for 192.168.1.23 [host down]
36Nmap scan report for 192.168.1.24 [host down]
37Nmap scan report for 192.168.1.25 [host down]
38Nmap scan report for 192.168.1.26 [host down]
39Nmap scan report for 192.168.1.27 [host down]
40Nmap scan report for 192.168.1.28 [host down]
41Nmap scan report for 192.168.1.29 [host down]
42Nmap scan report for 192.168.1.30 [host down]
43Nmap scan report for 192.168.1.31 [host down]
44Nmap scan report for 192.168.1.32 [host down]
45Nmap scan report for 192.168.1.33 [host down]
46Nmap scan report for 192.168.1.34 [host down]
47Nmap scan report for 192.168.1.35 [host down]
48Nmap scan report for 192.168.1.36 [host down]
49Nmap scan report for 192.168.1.37 [host down]
50Nmap scan report for 192.168.1.38 [host down]
51Nmap scan report for 192.168.1.40 [host down]
52Nmap scan report for 192.168.1.41 [host down]
53Nmap scan report for 192.168.1.42 [host down]
54Nmap scan report for 192.168.1.43 [host down]
55Nmap scan report for 192.168.1.44 [host down]
56Nmap scan report for 192.168.1.45 [host down]
57Nmap scan report for 192.168.1.46 [host down]
58Nmap scan report for 192.168.1.47 [host down]
59Nmap scan report for 192.168.1.48 [host down]
60Nmap scan report for 192.168.1.49 [host down]
61Nmap scan report for 192.168.1.50 [host down]
62Nmap scan report for 192.168.1.51 [host down]
63Nmap scan report for 192.168.1.52 [host down]
64Nmap scan report for 192.168.1.53 [host down]
65Nmap scan report for 192.168.1.54 [host down]
66Nmap scan report for 192.168.1.55 [host down]
67Nmap scan report for 192.168.1.56 [host down]
68Nmap scan report for 192.168.1.57 [host down]
69Nmap scan report for 192.168.1.58 [host down]
70Nmap scan report for 192.168.1.59 [host down]
71Nmap scan report for 192.168.1.60 [host down]
72Nmap scan report for 192.168.1.61 [host down]
73Nmap scan report for 192.168.1.62 [host down]
74Nmap scan report for 192.168.1.63 [host down]
75Nmap scan report for 192.168.1.64 [host down]
76Nmap scan report for 192.168.1.65 [host down]
77Nmap scan report for 192.168.1.66 [host down]
78Nmap scan report for 192.168.1.67 [host down]
79Nmap scan report for 192.168.1.68 [host down]
80Nmap scan report for 192.168.1.69 [host down]
81Nmap scan report for 192.168.1.70 [host down]
82Nmap scan report for 192.168.1.71 [host down]
83Nmap scan report for 192.168.1.72 [host down]
84Nmap scan report for 192.168.1.73 [host down]
85Nmap scan report for 192.168.1.74 [host down]
86Nmap scan report for 192.168.1.75 [host down]
87Nmap scan report for 192.168.1.76 [host down]
88Nmap scan report for 192.168.1.77 [host down]
89Nmap scan report for 192.168.1.78 [host down]
90Nmap scan report for 192.168.1.79 [host down]
91Nmap scan report for 192.168.1.81 [host down]
92Nmap scan report for 192.168.1.82 [host down]
93Nmap scan report for 192.168.1.83 [host down]
94Nmap scan report for 192.168.1.84 [host down]
95Nmap scan report for 192.168.1.85 [host down]
96Nmap scan report for 192.168.1.86 [host down]
97Nmap scan report for 192.168.1.87 [host down]
98Nmap scan report for 192.168.1.88 [host down]
99Nmap scan report for 192.168.1.89 [host down]
100Nmap scan report for 192.168.1.90 [host down]
101Nmap scan report for 192.168.1.91 [host down]
102Nmap scan report for 192.168.1.92 [host down]
103Nmap scan report for 192.168.1.93 [host down]
104Nmap scan report for 192.168.1.94 [host down]
105Nmap scan report for 192.168.1.95 [host down]
106Nmap scan report for 192.168.1.96 [host down]
107Nmap scan report for 192.168.1.97 [host down]
108Nmap scan report for 192.168.1.98 [host down]
109Nmap scan report for 192.168.1.99 [host down]
110Nmap scan report for 192.168.1.100 [host down]
111Nmap scan report for 192.168.1.101 [host down]
112Nmap scan report for 192.168.1.102 [host down]
113Nmap scan report for 192.168.1.104 [host down]
114Nmap scan report for 192.168.1.105 [host down]
115Nmap scan report for 192.168.1.106 [host down]
116Nmap scan report for 192.168.1.107 [host down]
117Nmap scan report for 192.168.1.108 [host down]
118Nmap scan report for 192.168.1.109 [host down]
119Nmap scan report for 192.168.1.110 [host down]
120Nmap scan report for 192.168.1.111 [host down]
121Nmap scan report for 192.168.1.112 [host down]
122Nmap scan report for 192.168.1.113 [host down]
123Nmap scan report for 192.168.1.114 [host down]
124Nmap scan report for 192.168.1.115 [host down]
125Nmap scan report for 192.168.1.116 [host down]
126Nmap scan report for 192.168.1.117 [host down]
127Nmap scan report for 192.168.1.118 [host down]
128Nmap scan report for 192.168.1.119 [host down]
129Nmap scan report for 192.168.1.120 [host down]
130Nmap scan report for 192.168.1.121 [host down]
131Nmap scan report for 192.168.1.122 [host down]
132Nmap scan report for 192.168.1.123 [host down]
133Nmap scan report for 192.168.1.124 [host down]
134Nmap scan report for 192.168.1.125 [host down]
135Nmap scan report for 192.168.1.126 [host down]
136Nmap scan report for 192.168.1.127 [host down]
137Nmap scan report for 192.168.1.128 [host down]
138Nmap scan report for 192.168.1.129 [host down]
139Nmap scan report for 192.168.1.130 [host down]
140Nmap scan report for 192.168.1.131 [host down]
141Nmap scan report for 192.168.1.132 [host down]
142Nmap scan report for 192.168.1.133 [host down]
143Nmap scan report for 192.168.1.134 [host down]
144Nmap scan report for 192.168.1.135 [host down]
145Nmap scan report for 192.168.1.136 [host down]
146Nmap scan report for 192.168.1.137 [host down]
147Nmap scan report for 192.168.1.138 [host down]
148Nmap scan report for 192.168.1.139 [host down]
149Nmap scan report for 192.168.1.140 [host down]
150Nmap scan report for 192.168.1.141 [host down]
151Nmap scan report for 192.168.1.142 [host down]
152Nmap scan report for 192.168.1.143 [host down]
153Nmap scan report for 192.168.1.144 [host down]
154Nmap scan report for 192.168.1.145 [host down]
155Nmap scan report for 192.168.1.146 [host down]
156Nmap scan report for 192.168.1.147 [host down]
157Nmap scan report for 192.168.1.148 [host down]
158Nmap scan report for 192.168.1.149 [host down]
159Nmap scan report for 192.168.1.150 [host down]
160Nmap scan report for 192.168.1.151 [host down]
161Nmap scan report for 192.168.1.152 [host down]
162Nmap scan report for 192.168.1.153 [host down]
163Nmap scan report for 192.168.1.154 [host down]
164Nmap scan report for 192.168.1.155 [host down]
165Nmap scan report for 192.168.1.156 [host down]
166Nmap scan report for 192.168.1.157 [host down]
167Nmap scan report for 192.168.1.158 [host down]
168Nmap scan report for 192.168.1.159 [host down]
169Nmap scan report for 192.168.1.160 [host down]
170Nmap scan report for 192.168.1.161 [host down]
171Nmap scan report for 192.168.1.162 [host down]
172Nmap scan report for 192.168.1.163 [host down]
173Nmap scan report for 192.168.1.164 [host down]
174Nmap scan report for 192.168.1.165 [host down]
175Nmap scan report for 192.168.1.166 [host down]
176Nmap scan report for 192.168.1.167 [host down]
177Nmap scan report for 192.168.1.168 [host down]
178Nmap scan report for 192.168.1.169 [host down]
179Nmap scan report for 192.168.1.170 [host down]
180Nmap scan report for 192.168.1.171 [host down]
181Nmap scan report for 192.168.1.172 [host down]
182Nmap scan report for 192.168.1.173 [host down]
183Nmap scan report for 192.168.1.174 [host down]
184Nmap scan report for 192.168.1.175 [host down]
185Nmap scan report for 192.168.1.176 [host down]
186Nmap scan report for 192.168.1.177 [host down]
187Nmap scan report for 192.168.1.178 [host down]
188Nmap scan report for 192.168.1.179 [host down]
189Nmap scan report for 192.168.1.181 [host down]
190Nmap scan report for 192.168.1.182 [host down]
191Nmap scan report for 192.168.1.183 [host down]
192Nmap scan report for 192.168.1.184 [host down]
193Nmap scan report for 192.168.1.185 [host down]
194Nmap scan report for 192.168.1.186 [host down]
195Nmap scan report for 192.168.1.187 [host down]
196Nmap scan report for 192.168.1.188 [host down]
197Nmap scan report for 192.168.1.189 [host down]
198Nmap scan report for 192.168.1.190 [host down]
199Nmap scan report for 192.168.1.191 [host down]
200Nmap scan report for 192.168.1.192 [host down]
201Nmap scan report for 192.168.1.193 [host down]
202Nmap scan report for 192.168.1.194 [host down]
203Nmap scan report for 192.168.1.195 [host down]
204Nmap scan report for 192.168.1.196 [host down]
205Nmap scan report for 192.168.1.197 [host down]
206Nmap scan report for 192.168.1.200 [host down]
207Nmap scan report for 192.168.1.201 [host down]
208Nmap scan report for 192.168.1.202 [host down]
209Nmap scan report for 192.168.1.203 [host down]
210Nmap scan report for 192.168.1.204 [host down]
211Nmap scan report for 192.168.1.205 [host down]
212Nmap scan report for 192.168.1.206 [host down]
213Nmap scan report for 192.168.1.207 [host down]
214Nmap scan report for 192.168.1.208 [host down]
215Nmap scan report for 192.168.1.209 [host down]
216Nmap scan report for 192.168.1.210 [host down]
217Nmap scan report for 192.168.1.211 [host down]
218Nmap scan report for 192.168.1.212 [host down]
219Nmap scan report for 192.168.1.213 [host down]
220Nmap scan report for 192.168.1.214 [host down]
221Nmap scan report for 192.168.1.215 [host down]
222Nmap scan report for 192.168.1.216 [host down]
223Nmap scan report for 192.168.1.217 [host down]
224Nmap scan report for 192.168.1.218 [host down]
225Nmap scan report for 192.168.1.219 [host down]
226Nmap scan report for 192.168.1.220 [host down]
227Nmap scan report for 192.168.1.221 [host down]
228Nmap scan report for 192.168.1.222 [host down]
229Nmap scan report for 192.168.1.223 [host down]
230Nmap scan report for 192.168.1.224 [host down]
231Nmap scan report for 192.168.1.225 [host down]
232Nmap scan report for 192.168.1.226 [host down]
233Nmap scan report for 192.168.1.227 [host down]
234Nmap scan report for 192.168.1.228 [host down]
235Nmap scan report for 192.168.1.229 [host down]
236Nmap scan report for 192.168.1.230 [host down]
237Nmap scan report for 192.168.1.231 [host down]
238Nmap scan report for 192.168.1.232 [host down]
239Nmap scan report for 192.168.1.233 [host down]
240Nmap scan report for 192.168.1.234 [host down]
241Nmap scan report for 192.168.1.235 [host down]
242Nmap scan report for 192.168.1.236 [host down]
243Nmap scan report for 192.168.1.237 [host down]
244Nmap scan report for 192.168.1.238 [host down]
245Nmap scan report for 192.168.1.239 [host down]
246Nmap scan report for 192.168.1.240 [host down]
247Nmap scan report for 192.168.1.241 [host down]
248Nmap scan report for 192.168.1.242 [host down]
249Nmap scan report for 192.168.1.243 [host down]
250Nmap scan report for 192.168.1.244 [host down]
251Nmap scan report for 192.168.1.245 [host down]
252Nmap scan report for 192.168.1.246 [host down]
253Nmap scan report for 192.168.1.247 [host down]
254Nmap scan report for 192.168.1.248 [host down]
255Nmap scan report for 192.168.1.249 [host down]
256Nmap scan report for 192.168.1.250 [host down]
257Nmap scan report for 192.168.1.251 [host down]
258Nmap scan report for 192.168.1.252 [host down]
259Nmap scan report for 192.168.1.253 [host down]
260Nmap scan report for 192.168.1.254 [host down]
261Initiating Connect Scan at 17:16
262Scanning 8 hosts [1000 ports/host]
263Discovered open port 139/tcp on 192.168.1.199
264Discovered open port 5900/tcp on 192.168.1.199
265Discovered open port 53/tcp on 192.168.1.1
266Discovered open port 443/tcp on 192.168.1.1
267Discovered open port 23/tcp on 192.168.1.103
268Discovered open port 554/tcp on 192.168.1.103
269Discovered open port 111/tcp on 192.168.1.199
270Discovered open port 445/tcp on 192.168.1.199
271Discovered open port 8080/tcp on 192.168.1.199
272Discovered open port 80/tcp on 192.168.1.1
273Discovered open port 80/tcp on 192.168.1.198
274Discovered open port 80/tcp on 192.168.1.103
275Increasing send delay for 192.168.1.1 from 0 to 5 due to 17 out of 41 dropped probes since last increase.
276Increasing send delay for 192.168.1.80 from 0 to 5 due to 17 out of 42 dropped probes since last increase.
277Completed Connect Scan against 192.168.1.39 in 9.83s (7 hosts left)
278Discovered open port 3800/tcp on 192.168.1.103
279Discovered open port 5432/tcp on 192.168.1.199
280Discovered open port 6789/tcp on 192.168.1.103
281Discovered open port 2222/tcp on 192.168.1.199
282Completed Connect Scan against 192.168.1.199 in 39.30s (6 hosts left)
283Completed Connect Scan against 192.168.1.103 in 39.81s (5 hosts left)
284Completed Connect Scan against 192.168.1.1 in 47.49s (4 hosts left)
285Completed Connect Scan against 192.168.1.80 in 48.00s (3 hosts left)
286Completed Connect Scan against 192.168.1.2 in 48.20s (2 hosts left)
287Completed Connect Scan against 192.168.1.180 in 48.31s (1 host left)
288Completed Connect Scan at 17:17, 48.78s elapsed (8000 total ports)
289Initiating Service scan at 17:17
290Scanning 16 services on 8 hosts
291Service scan Timing: About 81.25% done; ETC: 17:21 (0:00:36 remaining)
292Completed Service scan at 17:20, 178.02s elapsed (16 services on 8 hosts)
293NSE: Script scanning 8 hosts.
294Initiating NSE at 17:20
295Completed NSE at 17:22, 86.75s elapsed
296Initiating NSE at 17:22
297Completed NSE at 17:22, 2.99s elapsed
298Initiating NSE at 17:22
299Completed NSE at 17:22, 0.03s elapsed
300Nmap scan report for 192.168.1.1
301Host is up (0.063s latency).
302Not shown: 997 closed ports
303PORT STATE SERVICE VERSION
30453/tcp open domain?
30580/tcp open http ADB Broadband HTTP Server
306| fingerprint-strings:
307| FourOhFourRequest:
308| HTTP/1.0 505 HTTP Version Not Supported
309| Date: Sat, 14 Mar 2020 16:18:14 UTC
310| Server: ADB Broadband HTTP Server
311| X-Frame-Options: DENY
312| Connection: close
313| Content-Language: en
314| Content-Type: text/html
315| Content-Length: 432
316| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
317| <html>
318| <head>
319| <title>505 HTTP Version Not Supported</title>
320| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
321| </head>
322| <body>
323| <h1>505 HTTP Version Not Supported</h1>
324| HTTP Version Not Supported
325| <hr>
326| <br>ADB Broadband HTTP Server<br>protocol: HTTP<br>ipv4 192.168.1.1 port 80<br><br>connected peer 192.168.1.39 port 60790<br>
327| </body>
328| </html>
329| GetRequest:
330| HTTP/1.0 505 HTTP Version Not Supported
331| Date: Sat, 14 Mar 2020 16:17:54 UTC
332| Server: ADB Broadband HTTP Server
333| X-Frame-Options: DENY
334| Connection: close
335| Content-Language: en
336| Content-Type: text/html
337| Content-Length: 432
338| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
339| <html>
340| <head>
341| <title>505 HTTP Version Not Supported</title>
342| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
343| </head>
344| <body>
345| <h1>505 HTTP Version Not Supported</h1>
346| HTTP Version Not Supported
347| <hr>
348| <br>ADB Broadband HTTP Server<br>protocol: HTTP<br>ipv4 192.168.1.1 port 80<br><br>connected peer 192.168.1.39 port 60720<br>
349| </body>
350|_ </html>
351|_http-favicon: Unknown favicon MD5: 891B49BFCF85440A998A204EFE7E64BA
352| http-methods:
353|_ Supported Methods: GET POST
354|_http-server-header: ADB Broadband HTTP Server
355|_http-title: Site doesn't have a title (text/html).
356|_http-trane-info: Problem with XML parsing of /evox/about
357443/tcp open ssl/https ADB Broadband HTTP Server
358| fingerprint-strings:
359| FourOhFourRequest:
360| HTTP/1.0 505 HTTP Version Not Supported
361| Date: Sat, 14 Mar 2020 16:18:11 UTC
362| Server: ADB Broadband HTTP Server
363| X-Frame-Options: DENY
364| Connection: close
365| Content-Language: en
366| Content-Type: text/html
367| Content-Length: 434
368| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
369| <html>
370| <head>
371| <title>505 HTTP Version Not Supported</title>
372| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
373| </head>
374| <body>
375| <h1>505 HTTP Version Not Supported</h1>
376| HTTP Version Not Supported
377| <hr>
378| <br>ADB Broadband HTTP Server<br>protocol: HTTPS<br>ipv4 192.168.1.1 port 443<br><br>connected peer 192.168.1.39 port 59796<br>
379| </body>
380| </html>
381| GetRequest:
382| HTTP/1.0 505 HTTP Version Not Supported
383| Date: Sat, 14 Mar 2020 16:18:01 UTC
384| Server: ADB Broadband HTTP Server
385| X-Frame-Options: DENY
386| Connection: close
387| Content-Language: en
388| Content-Type: text/html
389| Content-Length: 434
390| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
391| <html>
392| <head>
393| <title>505 HTTP Version Not Supported</title>
394| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
395| </head>
396| <body>
397| <h1>505 HTTP Version Not Supported</h1>
398| HTTP Version Not Supported
399| <hr>
400| <br>ADB Broadband HTTP Server<br>protocol: HTTPS<br>ipv4 192.168.1.1 port 443<br><br>connected peer 192.168.1.39 port 59762<br>
401| </body>
402|_ </html>
403|_http-favicon: Unknown favicon MD5: 891B49BFCF85440A998A204EFE7E64BA
404| http-methods:
405|_ Supported Methods: GET POST
406|_http-server-header: ADB Broadband HTTP Server
407|_http-title: Site doesn't have a title (text/html).
408|_http-trane-info: Problem with XML parsing of /evox/about
409| ssl-cert: Subject: commonName=192.168.1.1/organizationName=ADB Broadband S.p.A./stateOrProvinceName=Italy/countryName=IT
410| Issuer: commonName=192.168.1.1/organizationName=ADB Broadband S.p.A./stateOrProvinceName=Italy/countryName=IT
411| Public Key type: rsa
412| Public Key bits: 1024
413| Signature Algorithm: sha1WithRSAEncryption
414| Not valid before: 2011-10-17T16:22:37
415| Not valid after: 2016-10-15T16:22:37
416| MD5: db58 8fcd 893b 987e b8cd f85f 5bcb ff34
417|_SHA-1: dbb4 2b08 c5fb 2d30 f3de 4351 9128 efbc be25 1651
418|_ssl-date: 2020-03-14T16:22:13+00:00; 0s from scanner time.
4192 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
420==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
421SF-Port80-TCP:V=7.80%I=7%D=3/14%Time=5E6D03B7%P=aarch64-unknown-linux-andr
422SF:oid%r(GetRequest,291,"HTTP/1\.0\x20505\x20HTTP\x20Version\x20Not\x20Sup
423SF:ported\r\nDate:\x20Sat,\x2014\x20Mar\x202020\x2016:17:54\x20UTC\r\nServ
424SF:er:\x20ADB\x20Broadband\x20HTTP\x20Server\r\nX-Frame-Options:\x20DENY\r
425SF:\nConnection:\x20close\r\nContent-Language:\x20en\r\nContent-Type:\x20t
426SF:ext/html\r\nContent-Length:\x20432\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x
427SF:20\"-//W3C//DTD\x20HTML\x204\.01\x20Transitional//EN\">\n<html>\n<head>
428SF:\n<title>505\x20HTTP\x20Version\x20Not\x20Supported</title>\n<meta\x20h
429SF:ttp-equiv=\"content-type\"\x20content=\"text/html;\x20charset=iso-8859-
430SF:1\">\n</head>\n<body>\n\n<h1>505\x20HTTP\x20Version\x20Not\x20Supported
431SF:</h1>\n505\x20HTTP\x20Version\x20Not\x20Supported\n<hr>\n<br>ADB\x20Bro
432SF:adband\x20HTTP\x20Server<br>protocol:\x20HTTP<br>ipv4\x20192\.168\.1\.1
433SF:\x20port\x2080<br><br>connected\x20peer\x20192\.168\.1\.39\x20port\x206
434SF:0720<br>\n</body>\n</html>\r\n")%r(FourOhFourRequest,291,"HTTP/1\.0\x20
435SF:505\x20HTTP\x20Version\x20Not\x20Supported\r\nDate:\x20Sat,\x2014\x20Ma
436SF:r\x202020\x2016:18:14\x20UTC\r\nServer:\x20ADB\x20Broadband\x20HTTP\x20
437SF:Server\r\nX-Frame-Options:\x20DENY\r\nConnection:\x20close\r\nContent-L
438SF:anguage:\x20en\r\nContent-Type:\x20text/html\r\nContent-Length:\x20432\
439SF:r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x2
440SF:0Transitional//EN\">\n<html>\n<head>\n<title>505\x20HTTP\x20Version\x20
441SF:Not\x20Supported</title>\n<meta\x20http-equiv=\"content-type\"\x20conte
442SF:nt=\"text/html;\x20charset=iso-8859-1\">\n</head>\n<body>\n\n<h1>505\x2
443SF:0HTTP\x20Version\x20Not\x20Supported</h1>\n505\x20HTTP\x20Version\x20No
444SF:t\x20Supported\n<hr>\n<br>ADB\x20Broadband\x20HTTP\x20Server<br>protoco
445SF:l:\x20HTTP<br>ipv4\x20192\.168\.1\.1\x20port\x2080<br><br>connected\x20
446SF:peer\x20192\.168\.1\.39\x20port\x2060790<br>\n</body>\n</html>\r\n");
447==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
448SF-Port443-TCP:V=7.80%T=SSL%I=7%D=3/14%Time=5E6D03BE%P=aarch64-unknown-lin
449SF:ux-android%r(GetRequest,293,"HTTP/1\.0\x20505\x20HTTP\x20Version\x20Not
450SF:\x20Supported\r\nDate:\x20Sat,\x2014\x20Mar\x202020\x2016:18:01\x20UTC\
451SF:r\nServer:\x20ADB\x20Broadband\x20HTTP\x20Server\r\nX-Frame-Options:\x2
452SF:0DENY\r\nConnection:\x20close\r\nContent-Language:\x20en\r\nContent-Typ
453SF:e:\x20text/html\r\nContent-Length:\x20434\r\n\r\n<!DOCTYPE\x20HTML\x20P
454SF:UBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20Transitional//EN\">\n<html>\
455SF:n<head>\n<title>505\x20HTTP\x20Version\x20Not\x20Supported</title>\n<me
456SF:ta\x20http-equiv=\"content-type\"\x20content=\"text/html;\x20charset=is
457SF:o-8859-1\">\n</head>\n<body>\n\n<h1>505\x20HTTP\x20Version\x20Not\x20Su
458SF:pported</h1>\n505\x20HTTP\x20Version\x20Not\x20Supported\n<hr>\n<br>ADB
459SF:\x20Broadband\x20HTTP\x20Server<br>protocol:\x20HTTPS<br>ipv4\x20192\.1
460SF:68\.1\.1\x20port\x20443<br><br>connected\x20peer\x20192\.168\.1\.39\x20
461SF:port\x2059762<br>\n</body>\n</html>\r\n")%r(FourOhFourRequest,293,"HTTP
462SF:/1\.0\x20505\x20HTTP\x20Version\x20Not\x20Supported\r\nDate:\x20Sat,\x2
463SF:014\x20Mar\x202020\x2016:18:11\x20UTC\r\nServer:\x20ADB\x20Broadband\x2
464SF:0HTTP\x20Server\r\nX-Frame-Options:\x20DENY\r\nConnection:\x20close\r\n
465SF:Content-Language:\x20en\r\nContent-Type:\x20text/html\r\nContent-Length
466SF::\x20434\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x2
467SF:04\.01\x20Transitional//EN\">\n<html>\n<head>\n<title>505\x20HTTP\x20Ve
468SF:rsion\x20Not\x20Supported</title>\n<meta\x20http-equiv=\"content-type\"
469SF:\x20content=\"text/html;\x20charset=iso-8859-1\">\n</head>\n<body>\n\n<
470SF:h1>505\x20HTTP\x20Version\x20Not\x20Supported</h1>\n505\x20HTTP\x20Vers
471SF:ion\x20Not\x20Supported\n<hr>\n<br>ADB\x20Broadband\x20HTTP\x20Server<b
472SF:r>protocol:\x20HTTPS<br>ipv4\x20192\.168\.1\.1\x20port\x20443<br><br>co
473SF:nnected\x20peer\x20192\.168\.1\.39\x20port\x2059796<br>\n</body>\n</htm
474SF:l>\r\n");
475
476Nmap scan report for 192.168.1.2
477Host is up (0.065s latency).
478All 1000 scanned ports on 192.168.1.2 are closed
479
480Nmap scan report for 192.168.1.39
481Host is up (0.011s latency).
482All 1000 scanned ports on 192.168.1.39 are closed
483
484Nmap scan report for 192.168.1.80
485Host is up (0.039s latency).
486All 1000 scanned ports on 192.168.1.80 are closed
487
488Nmap scan report for 192.168.1.103
489Host is up (0.064s latency).
490Not shown: 995 closed ports
491PORT STATE SERVICE VERSION
49223/tcp open telnet BusyBox telnetd
49380/tcp open http
494| fingerprint-strings:
495| GetRequest:
496| HTTP/1.1 200 OK
497| Date: Thu, 02 Dec 2010 15:05:55 UTC
498| Content-Type: text/html
499| Content-Length: 58028
500|_ Connection: Close
501554/tcp open rtsp?
5023800/tcp open pwgpsi?
5036789/tcp open ibm-db2-admin?
504| fingerprint-strings:
505| JavaRMI:
506| /var/Challenge: ../../Src/Http/DH_HTTP.cpp: 831: virtual CompLib::RET_CODE CompLib::HTTPRequest::parseHead(const std::string&): Assertion `end != std::string::npos' failed.
507| ----client connect ip:<192.168.1.39>,port:<33098>, id:<45>
508| 17:16:57|trace ----client disconnect , its id:<45>
509| 17:17:00|trace CVFDCommandTimeLed::setParam>>17:17:0
510| 17:17:09|trace libkeyboard.a::KeepAlive ff a 0 0!
511| CNetWorkService::onConnTimer-----------------
512| 17:17:24|trace libkeyboard.a::KeepAlive ff a 0 0!
513| libkeyboard.a::KeepAlive ff a 0 0!
514| LIBDVR_MSG : 2020-3-14, weekday:6 time:17:17:41
515| ==TPLayer== Accept on sock:<49>
516| ----client connect ip:<192.168.1.39>,port:<53530>, id:<49>
517| ===================== exception occur ======================222
518| pid: 1169 [/var/Challenge], tid: 1216 [Challenge]
519| signal num: 6
520| ===================== CPU registers ======================
521| 0x008fa912
522|_ EBP: 0x42ef2fe8, ESP: 0x42ef26c8
5232 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
524==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
525SF-Port80-TCP:V=7.80%I=7%D=3/14%Time=5E6D03B2%P=aarch64-unknown-linux-andr
526SF:oid%r(GetRequest,7B,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Thu,\x2002\x20D
527SF:ec\x202010\x2015:05:55\x20UTC\r\nContent-Type:\x20text/html\r\nContent-
528SF:Length:\x2058028\r\nConnection:\x20Close\r\n\r\n");
529==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
530SF-Port6789-TCP:V=7.80%I=7%D=3/14%Time=5E6D03B7%P=aarch64-unknown-linux-an
531SF:droid%r(JavaRMI,397,"/var/Challenge:\x20\.\./\.\./Src/Http/DH_HTTP\.cpp
532SF::\x20831:\x20virtual\x20CompLib::RET_CODE\x20CompLib::HTTPRequest::pars
533SF:eHead\(const\x20std::string&\):\x20Assertion\x20`end\x20!=\x20std::stri
534SF:ng::npos'\x20failed\.\n45>\n----client\x20connect\x20ip:<192\.168\.1\.3
535SF:9>,port:<33098>,\x20id:<45>\n17:16:57\|trace\x20----client\x20disconnec
536SF:t\x20,\x20its\x20id:<45>\n17:17:00\|trace\x20CVFDCommandTimeLed::setPar
537SF:am>>17:17:0\n17:17:09\|trace\x20libkeyboard\.a::KeepAlive\x20ff\x20a\x2
538SF:00\x200!\nCNetWorkService::onConnTimer-----------------\n17:17:24\|trac
539SF:e\x20libkeyboard\.a::KeepAlive\x20ff\x20a\x200\x200!\nlibkeyboard\.a::K
540SF:eepAlive\x20ff\x20a\x200\x200!\nLIBDVR_MSG\x20:\x202020-3-14,\x20weekda
541SF:y:6\x20time:17:17:41\n==TPLayer==\x20Accept\x20on\x20sock:<49>\n----cli
542SF:ent\x20connect\x20ip:<192\.168\.1\.39>,port:<53530>,\x20id:<49>\n======
543SF:===============\x20exception\x20occur\x20======================222\npid
544SF::\x201169\x20\[/var/Challenge\],\x20tid:\x201216\x20\[Challenge\]\nsign
545SF:al\x20num:\x206\n\n=====================\x20\x20CPU\x20registers\x20\x2
546SF:0======================\nPC:\x200x008fa912\nEBP:\x200x42ef2fe8,\x20ESP:
547SF:\x200x42ef26c8\n17");
548
549Nmap scan report for 192.168.1.180
550Host is up (0.060s latency).
551All 1000 scanned ports on 192.168.1.180 are closed
552
553Nmap scan report for 192.168.1.198
554Host is up (0.062s latency).
555Not shown: 999 filtered ports
556PORT STATE SERVICE VERSION
55780/tcp open http nginx 1.14.0 (Ubuntu)
558| http-methods:
559|_ Supported Methods: GET HEAD OPTIONS
560|_http-server-header: nginx/1.14.0 (Ubuntu)
561| http-title: Prihl\xC3\xA1senie | FT5000 Admin
562|_Requested resource was /admin/login/?next=/admin/
563Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
564
565Nmap scan report for 192.168.1.199
566Host is up (0.059s latency).
567Not shown: 993 closed ports
568PORT STATE SERVICE VERSION
569111/tcp open rpcbind 2-4 (RPC #100000)
570| rpcinfo:
571| program version port/proto service
572| 100000 2,3,4 111/tcp rpcbind
573| 100000 2,3,4 111/udp rpcbind
574| 100000 3,4 111/tcp6 rpcbind
575| 100000 3,4 111/udp6 rpcbind
576| 100024 1 50609/tcp status
577| 100024 1 53577/tcp6 status
578| 100024 1 54537/udp6 status
579|_ 100024 1 59172/udp status
580139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
581445/tcp open netbios-ssn Samba smbd 4.2.14-Debian (workgroup: WORKGROUP)
5822222/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u3 (protocol 2.0)
583| ssh-hostkey:
584| 1024 fa:67:83:46:ad:08:54:e2:a2:9a:3b:7a:32:f2:77:ba (DSA)
585| 2048 25:20:d0:70:0f:9d:68:ba:c6:e5:12:af:34:da:26:c5 (RSA)
586| 256 8b:05:3e:57:e9:41:39:65:70:ac:3f:e1:6d:24:b9:14 (ECDSA)
587|_ 256 d7:9d:f4:e6:73:b4:b6:48:1a:4d:61:da:e8:b5:ad:7d (ED25519)
5885432/tcp open postgresql PostgreSQL DB 9.4.13 - 9.4.15
589| ssl-cert: Subject: commonName=titan
590| Issuer: commonName=titan
591| Public Key type: rsa
592| Public Key bits: 2048
593| Signature Algorithm: sha256WithRSAEncryption
594| Not valid before: 2015-07-24T07:49:25
595| Not valid after: 2025-07-21T07:49:25
596| MD5: bbc1 fe93 c9a7 0957 d61c 9dd9 ee6f c4ec
597|_SHA-1: 8ca3 d090 5a1e a034 0676 3942 3422 0fe7 5846 bdd4
598|_ssl-date: TLS randomness does not represent time
5995900/tcp open vnc VNC (protocol 3.8)
600|_ssl-cert: ERROR: Script execution failed (use -d to debug)
601|_ssl-date: ERROR: Script execution failed (use -d to debug)
602|_sslv2: ERROR: Script execution failed (use -d to debug)
603|_tls-alpn: ERROR: Script execution failed (use -d to debug)
604|_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug)
605|_vnc-info: ERROR: Script execution failed (use -d to debug)
6068080/tcp open http lighttpd 1.4.35
607| http-methods:
608|_ Supported Methods: GET HEAD POST OPTIONS
609|_http-server-header: lighttpd/1.4.35
610| http-title: Publix - Informa\xC3\x84\xC2\x8Dn\xC3\x83\xC2\xBD port\xC3\x83\xC2\xA1l \xC3\x84\xC2\x8CS
611|_Requested resource was login.pl?err=3
612Service Info: Host: TITAN; OS: Linux; CPE: cpe:/o:linux:linux_kernel
613
614Host script results:
615|_clock-skew: mean: -19m58s, deviation: 34m34s, median: 0s
616| nbstat: NetBIOS name: TITAN, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
617| Names:
618| TITAN<00> Flags: <unique><active>
619| TITAN<03> Flags: <unique><active>
620| TITAN<20> Flags: <unique><active>
621| \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
622| WORKGROUP<00> Flags: <group><active>
623| WORKGROUP<1d> Flags: <unique><active>
624|_ WORKGROUP<1e> Flags: <group><active>
625| smb-os-discovery:
626| OS: Windows 6.1 (Samba 4.2.14-Debian)
627| Computer name: titan
628| NetBIOS computer name: TITAN\x00
629| Domain name: \x00
630| FQDN: titan
631|_ System time: 2020-03-14T17:20:52+01:00
632| smb-security-mode:
633| account_used: guest
634| authentication_level: user
635| challenge_response: supported
636|_ message_signing: disabled (dangerous, but default)
637| smb2-security-mode:
638| 2.02:
639|_ Message signing enabled but not required
640| smb2-time:
641| date: 2020-03-14T16:20:49
642|_ start_date: N/A
643
644NSE: Script Post-scanning.
645Initiating NSE at 17:22
646Completed NSE at 17:22, 0.00s elapsed
647Initiating NSE at 17:22
648Completed NSE at 17:22, 0.00s elapsed
649Initiating NSE at 17:22
650Completed NSE at 17:22, 0.00s elapsed
651Post-scan script results:
652| clock-skew:
653| -19m58s:
654| 192.168.1.199
655|_ 192.168.1.1
656Read data files from: /data/data/com.termux/files/usr/bin/../share/nmap
657Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
658Nmap done: 254 IP addresses (8 hosts up) scanned in 330.01 seconds
659$ -